[go: up one dir, main page]

Sulaimon, 2012 - Google Patents

Network security

Sulaimon, 2012

View PDF
Document ID
6217080611964980352
Author
Sulaimon A
Publication year

External Links

Snippet

The rapid increase in computer, mobile applications and wireless networks has globally changed the features of network security. A series of Internet attack and fraudulent acts on companies and individual network have shown us that open computer networks have no …
Continue reading at www.theseus.fi (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection

Similar Documents

Publication Publication Date Title
US20100043066A1 (en) Multiple security layers for time-based network admission control
Abdelghani Implementation of defense in depth strategy to secure industrial control system in critical infrastructures
Alabady Design and Implementation of a Network Security Model for Cooperative Network.
Chauhan Practical Network Scanning: Capture network vulnerabilities using standard tools such as Nmap and Nessus
Sadiqui Computer network security
Singh et al. CCNA Security 210-260 Certification Guide: Build your knowledge of network security and pass your CCNA Security exam (210-260)
Funmilola et al. Review of Computer Network Security System
Karamagi Comptia Security+ Practice Exams
Sulaimon Network security
Mohseni Network Security for Small Businesses
Kule et al. Design of effectively efficient techniques for circumvent wireless network security threats and attacks
Haji et al. Practical security strategy for SCADA automation systems and networks
Gibson Comptia Security+: get certified get ahead
Mbah Bachelor’s Thesis
Ali et al. Design and implementation of a secured remotely administrated network
Rayjada et al. Analytical Research of Data Center Security Implementations and Cyber Attacks
Patel Computer Network Security System
Davis Constructing and Probing a Fortified Network
Sarvepalli Designing Network Security Labs
Sarjiyus et al. Simulation of an Enhanced Network Security Framework for Federal Polytechnic Mubi
BALEMI BULE HORA UNIVERSIRTY
Groen Silent Sabotage: Identifying and Preventing Cyber Attacks from Inside Actors
Μπαξεβάνος Protecting with network security strategies a medium size enterprise and implementing scenarios attacks and countermeasures on cisco equipment
Floyd The Changing Face of Network Security Threats
MAREȘ Solutions to Secure a Network